Application background
The WinDriver™ device driver development tool supports any device, regardless of its silicon vendor, and enables you to focus on your driver’s added-value functionality, instead of on the operating system internals. WinDriver’s driver development solution covers USB, P...

Network vulnerability scans, CGI FINGER FTP vulnerability can sweep, c++ language to probe target systems host, active port scanning host determines open ports, in accordance with Protocol fingerprint technology to identify a host operating system type. Then the scanner to open the ports for the net...

This is the Intrusion Detection curriculum design, which has the source code and test reports, and the program can be run. This is the Intrusion Detection curriculum design, which has the source code and test reports, and the program can be run. This is the Intrusion Detection curriculum design, whi...

This is a software source code can be used to monitor the mouse and keyboard, you can monitor the mouse's scroll, click operations, always displays the mouse position when a mouse event occurs, will remain in the monitor box records. Can also monitor the keyboard input and record keyboard input...

Very good explanation document buffer overflow and code, author of humorous language explaining the overflow of esoteric processes, document complete with source code, can be used for learning and debugging, and would like to thank the authors for sharing it! "Because of the black hand eBook lo...

Application backgroundNetwork analysis of the download, can help you solve all the charges of the video can not be downloaded free of charge!!!Key TechnologyUse the video to see the address, the encrypted video, so as to obtain the real address of the video link, so as to achieve the purpose of free...